cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
social engineering is the art of manipulating people so they give up confidential information.
Types of social engineering include:
blagging - the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
phishing - a technique of fraudulently obtaining private information, often using email or text messages.
shouldering - observing a person's private information over their shoulder. For example, cash machine PIN numbers.
Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software. Its name comes from Malicious Software.
Types of malware include:
computer virus - a file that contains malicious code, spreads throughout the computer making copies of itself.
trojan - a malicious file or application that pretends to be helpful. For example, a free antivirus software that actually installs a virus itself.
spyware - malicious code that captures the coputer users data and sends it back to the malicious party that made it. For example, it might use a keylogger to recognise what you type in, steal your usernames and passwords and send them back to the hacker.
Pharming is a cyber attack intended to redirect a website's traffic to a fake website, often using email or text messages.
Default passwords like "password" are easily guessed and are the first things a hacker will try.
Users have access to data they need, if a user has access to data they don't need, this can compromise the security of that data if the user is hacked or choses to act maliciously themselves.
Removable media like a USB memory stick can be pre-loaded with malware and then left in public spaces and offices where someone may find it and plug it into their computer, infecting their computer with the malware that was on the USB memory stick.
Unpatched and outdated software is a threat because there may be code vulnerabilities in the software, that gets fixed with an update, by not updating the software, your version stays vulnerable and easy for hackers to exploit.
These vulnerabilities are often well documented and discussed online so it isn't difficult for hackers to know about them.
bio = life
metric = measure
biometric = measuring life
Mostly found in mobile devices like smartphones and tablets, biometric methods include:
retina scanners
fingerprint scanners
facial recognition
voice recognition
They are generally considered secure as they are relatively unique to each person and are hard to copy.
Making a new, secure password makes it more difficult for hackers to guess or brute force (trying all possible passwords).
Passwords should be between 8 and 12 characters long, contain a mix of lowercase, uppercase, numbers and symbols and they should be changed regularly.
Passwords should never be shared with someone else.
Passwords can also be encrypted to increase their security on a network.
Setting software updates to happen automatically ensures you are always on the most up-to-date version with the latest security fixes, meaning that you won't have to remember to do it or keep on top of known vulnerabilities to keep yourself safe.
Authentication in this instance is referring to multiple ways of checking the user is who they say they are (two factor authentication) like, using email confirmations to confirm a user’s identity.
Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.
There are two types:
Malicious Insider Testing: when the person or team testing the system has some knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system (a malicious insider).
External Attack Testing: when the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system (an external attack).
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA is used frequently on websites when you are signing up for or logging into an account and are used to ensure the user creating the account is human.